Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c00746c27c6f8cf3c8e99e49cd02609d
-
SHA1
d6fd7e085422e23b56bb53355528f4889425ac3c
-
SHA256
87472f9d103ac03e57a2ed4b5d7e0a239c48bd371a00d35696a067804233f3e2
-
SHA512
0dc37029c2935cf254c9fa6aee5e4dd5afb6a84a807403bad44ed7af7d90ccd543e86fa8d5422fd52ab96498529e5e5259fe7328b12e3f42161baf1c9be4d39b
-
SSDEEP
49152:SnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:+8qPoBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3313) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3040 mssecsvc.exe 2912 mssecsvc.exe 2492 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2316 wrote to memory of 2972 2316 rundll32.exe 30 PID 2972 wrote to memory of 3040 2972 rundll32.exe 31 PID 2972 wrote to memory of 3040 2972 rundll32.exe 31 PID 2972 wrote to memory of 3040 2972 rundll32.exe 31 PID 2972 wrote to memory of 3040 2972 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2492
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50a43264152308915166b769cb06e5c22
SHA1842a188d078d2feea50bd7caec1340262ec403ce
SHA2563d262736288b669891351783caedd1312436c8446ad4f713222bed1669222104
SHA512a0b8226f097a7edf099584c8666cac1d285aedd456354396381d90d6587accf50497ad86a0620213b7496e973d3adafd220df5a88b2612477e1bfdb3659ff3a1
-
Filesize
3.4MB
MD50c47cb295262b88d54e6c38aaae45083
SHA1c5af34f55b424fd3b1d50d8257bc2339330e8462
SHA25689d41ea8ff8ede377c17078b8c1f471d84fe1a5e3c51d50455f99edc4c40fc94
SHA512688ce8730e0b31990fba2c01a81055af0af0875d4106bb8fa566b8de35ef5fb48b70dae9b295fd391fb24db21cebfdc6fd7ac9f8bb84f3c54b8416b86b2f6fc4